Professor Warner joined the Chicago-Kent faculty in 1990. Prior to that, he was an
assistant professor of philosophy at the University of Southern California and the
University of Pennsylvania. He teaches Contracts, Remedies, Jurisprudence, Internet Law,
and E-Commerce Law and has published several articles and books on philosophical and
legal topics. 

Professor Warner was named a Norman and Edna Freehling Scholar in 2002 and is the faculty
director of Chicago-Kent’s Center for Law and Computers. He is the director of
Chicago-Kent's Project Poland (www.kentlaw.edu/poland) and visiting foreign
professor at University of Gdańsk, Poland, where he is director of the School of American
Law. He is also director of the School of American Law at the University of Wrocław,
Poland. From 1994 to 1996, he was president of InterActive Computer Tutorials, a software
company, and from 1998 to 2000, he was director of Building Businesses on the Web, an
Illinois Institute of Technology executive education program concerning e-commerce. 

Professor Warner's research concerns the regulation of business competition on the
Internet and Internet security as well as the nature of human rights and their grounding
in personal freedom. He has lectured on Internet security at the second United Nations
Economic Commission for Europe workshop, "E-Regulations: E-Security and Knowledge
Economy," in Geneva, Switzerland, and, at the invitation of the FBI, on global
cybercrime before the Chicago Crime Commission. He was the principal investigator for
"Using Education to Combat White Collar Crime," a U.S. State Department grant
devoted to combating money laundering in Ukraine from 2000 to 2006. He is currently a
member of the U.S. Secret Service’s Electronic and Financial Crimes Taskforce. 

Professor Warner earned his J.D. from the University of Southern California, where he
served on the Southern California Law Review and was elected to the Order of the Coif. He
received his Ph.D. in philosophy from the University of California, Berkeley, and he
received his B.A. (with distinction and Phi Beta Kappa) in English from Stanford
University. 

Articles

PDF

Self, Privacy, and Power: Is It All Over?, TULANE JOURNAL OF TECHNOLOGY & INTELLECTUAL PROPERTY (2014)

The realization of a multifaceted self is an ideal one strives to realize. One realizes...

 

File

Beyond Notice and Choice: Privacy, Norms, and Consent (forthcoming) (with Robert Sloan), Suffolk University Journal of High Technology Law (2013)

Informational privacy is the ability to determine for yourself when and how others may collect...

 

PDF

Behavioral Advertising: From One-Sided Chicken to Informational Norms (with Robert Sloan), Vanderbilt Journal of Entertainment & Technology Law (2012)

When you download the free audio recording software from Audacity, you agree that Audacity may...

 
Legal Concepts Meet Technology: A 50-State Survey of Privacy Laws (with M. Russom & R. Sloan), Proceedings of the 2011 Annual Computer Security Applications Conference, Workshop on Governance of Technology, Information, and Policies (2012)
 
Vulnerable Software: Product-Risk Norms and the Problem of Unauthorized Access, co-authored with Robert Sloan, University of Illinois Journal of Technology, Law and Policy (2012)
 

Books

Link

Unauthorized Access: The Crisis in Online Privacy and Security (with R. Sloan) (2013)

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy...

 
Pragmatism and Legal Reasoning, HILARY PUTNAM: PRAGMATISM AND REALISM,, Urzula Zeglen and James Conant (eds) (2002)
 

Contributions to Books

Austin, J. L., Wiley-Blackwell's International Encyclopedia of Ethics (2013)
 
Local or Global?: Morals from Federal Preemption Doctrine, Federalism or Unitary System? Determinants, Effects, and the Influence on the Legal Regulation of States (2012)
 
Legal Pragmatism, A Companion to Philosophy of Law and Legal Theory (2009)
 

Unpublished Papers

File

Vulnerable Software: Product-Risk Norms and the Problem of Unauthorized Access (with Robert Sloan), ExpressO (2011)

Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a...

 

PDF

Undermined Norms: The Corrosive Effect of Information Processing Technology on Informational Privacy, ExpressO (2010)

Informational privacy is a matter of control; it consists in the ability to control when...

 

Other